Health Information Technology and Data Sharing Sample Clauses

Health Information Technology and Data Sharing. The use of Health Information Technology (HIT) has the potential to improve the quality and efficiency of health care delivery in numerous ways. Digitizing and sharing health care data can reduce medical errors, increase efficiency, decrease duplicative or unnecessary services and reduce fraud and abuse. Additionally, HIT initiatives are important in improving the data quality necessary for public health research, evidenced-based decision-making, population health management and reduction of manual, labor-intensive monitoring and oversight. Contractors should develop, implement and participate in HIT and data sharing initiatives in order to improve the quality, efficiency and safety of health care delivery in Indiana. The Contractor shall also cooperate and participate in the development and implementation of future FSSA-driven HIT initiatives. Contractors shall be required to enter into data sharing agreements with any health information technology entity that the State enters into data sharing agreements with. OMPP reserves the right to require Contractors to establish personal health records (PHRs) for its members in the future. A PHR is an electronic health record of the member that is maintained by the Contractor. PHRs typically include a summary of member health and medical history such as diagnoses, allergies, family history, lab results, vaccinations, surgeries, etc., and may also include claims information. In the event the State adopts a standard PHR format, the Contractor shall be required to implement the State’s standard format. The Contractor shall also be required to incorporate its member portal information and, for HIP members, POWER Account balance information into the PHR. In addition to a PHR, the following are examples of other types of HIT initiatives that the Contractor may consider developing:  Electronic medical record (EMR). An electronic medical record provides for electronic entry and storage of patients’ medical record data. Depending on the local information technology infrastructure, EMRs may also allow for electronic data transmission and data sharing. More complex EMRs can integrate computerized provider order entry (CPOE) and e-prescribing functions.  Inpatient computerized provider order entry (CPOE). CPOE refers to a computer-based system of ordering diagnostic and treatment services, including laboratory, radiology and medications. A basic CPOE system promotes legible and complete order entry and can provide basic cli...
AutoNDA by SimpleDocs

Related to Health Information Technology and Data Sharing

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Health Information Subject to all applicable privacy laws, the member irrevocably authorises any doctor or other person who may have, or may acquire, any information concerning their health to disclose such information to Specialty Emergency Services, and that this authority shall remain in force for a period of not less than 12 (twelve) months following the expiry date of this Membership Agreement. 8.1 If deemed necessary by Specialty Emergency Services, for both the correct treatment of the member and to comply with the terms and conditions, the Member allows Specialty Emergency Services to screen for narcotics and any/all forms of mind-altering substances by blood test undertaken by a licensed doctor in a licensed medical facility.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Protected Health Information “Protected Health Information” shall have the same meaning as the term “protected health information” in Section 160.103 and is limited to the information created or received by Contractor from or on behalf of County.

  • ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Amendment of Protected Health Information 8.1 To the extent Covered Entity determines that any Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within ten (10) business days after receipt of a written request from Covered Entity, make any amendments to such Protected Health Information that are requested by Covered Entity, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.526. 8.2 If any Individual requests an amendment to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within five (5) days of the receipt of the request. Whether an amendment shall be granted or denied shall be determined by Covered Entity.

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!